Skip to main content

Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14341))

  • 308 Accesses

Abstract

The feature of Enhanced Mobile Broadband (eMBB) and Cloud-Fog hybrid architecture in 5G significantly enhance the communication and computation capabilities of 5G devices, and make the biometric traits collection, recognition and authentication become possible. However, since biometrics such as face ID, fingerprint, etc. are belonging to user’s privacy, by considering the curiosity of cloud server and the law of General Data Protection Regulation (GDPR), we can’t use biometrics directly in 5G cloud-fog hybrid scenarios. To solve this problem, in this paper, we propose a privacy-preserving authentication scheme based on soft biometric traits (PPA-SBT). In our scheme, soft biometrics without privacy attributes are designed to protect the biometrics with privacy attributes through encryption, and improve the recognition speed and accuracy rate. We conducted the theoretical security analysis of the proposed scheme with formal method and also conducted experiments with real dataset and public datasets respectively, the experimental results demonstrate the feasibility and convenience of PPA-SBT.

This work was supported by National Key R &D Program of China No.2022YFB2902205 and the Key Research and Development Program of Shaanxi(No.2020ZDLGY08-08).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ailisto, H., Vildjiounaite, E., Lindholm, M., Mäkelä, S.M., Peltola, J.: Soft biometrics-combining body weight and fat measurements with fingerprint biometrics. Pattern Recognit. Lett. 27(5), 325–334 (2006)

    Article  Google Scholar 

  2. Ali, M.M., Mahale, V.H., Yannawar, P., Gaikwad, A.: Overview of fingerprint recognition system. In: 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 1334–1338. IEEE (2016)

    Google Scholar 

  3. Ali, Z., Hossain, M.S., Muhammad, G., Ullah, I., Abachi, H., Alamri, A.: Edge-centric multimodal authentication system using encrypted biometric templates. Futur. Gener. Comput. Syst. 85, 76–87 (2018)

    Article  Google Scholar 

  4. Babaeizadeh, M., Bakhtiari, M., Mohammed, A.M.: Authentication methods in cloud computing: a survey. Res. J. Appl. Sci. Eng. Technol. 9(8), 655–664 (2015)

    Article  Google Scholar 

  5. Basin, D., Cremers, C., Dreier, J., Sasse, R.: Symbolically analyzing security protocols using tamarin. ACM SIGLOG News 4(4), 19–30 (2017). https://doi.org/10.1145/3157831.3157835

  6. Belkhouja, T., Du, X., Mohamed, A., Al-Ali, A.K., Guizani, M.: Biometric-based authentication scheme for implantable medical devices during emergency situations. Futur. Gener. Comput. Syst. 98, 109–119 (2019). https://doi.org/10.1016/j.future.2019.02.002, http://www.sciencedirect.com/science/article/pii/S0167739X18325792

  7. Bertillon, A., McClaughry, R.W.: Signaletic Instructions Including the Theory and Practice of Anthropometrical Identification. Werner Company, Greenville (1896)

    Google Scholar 

  8. Bhatnagar, G., JonathanWu, Q.: Anovel chaotic encryption framework for securing palmprint data. Procedia Comput. Sci. 10, 442–449 (2012)

    Article  Google Scholar 

  9. Bhatnagar, G., Wu, Q.: Enhancing the transmission security of biometric images using chaotic encryption. Multimed. Syst. 20(2), 203–214 (2014)

    Article  Google Scholar 

  10. Chen, C.K., Lin, C.L., Chiang, C.T., Lin, S.L.: Personalized information encryption using ECG signals with chaotic functions. Inf. Sci. 193, 125–140 (2012)

    Article  Google Scholar 

  11. Dantcheva, A., Velardo, C., D’angelo, A., Dugelay, J.L.: Bag of soft biometrics for person identification. Multimed. Tools Appl. 51(2), 739–777 (2011)

    Article  Google Scholar 

  12. Feng, L.: Speaker Recognition. Ph.D. thesis, September 2004

    Google Scholar 

  13. Fu, Y., Yan, Z., Li, H., Xin, X.L., Cao, J.: A secure SDN based multi-rans architecture for future 5G networks. Comput. Secur. 70, 648–662 (2017)

    Article  Google Scholar 

  14. Fu, Y., Yuan, X., Wang, K., Yan, Z., Li, H.: A security formal model for multiple channels communication. In: Proceedings of the Proceedings of Smart World Congress 2019 (2019)

    Google Scholar 

  15. Jain, A.K., Dass, S.C., Nandakumar, K.: Soft biometric traits for personal recognition systems. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 731–738. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-25948-0_99

    Chapter  Google Scholar 

  16. Khan, M.K., Zhang, J., Alghathbar, K.: Challenge-response-based biometric image scrambling for secure personal identification. Futur. Gener. Comput. Syst. 27(4), 411–418 (2011)

    Article  Google Scholar 

  17. Kinnunen, T., Li, H.: An overview of text-independent speaker recognition: from features to supervectors. Speech Commun. 52(1), 12–40 (2010)

    Article  Google Scholar 

  18. Lamacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. IACR Cryptology ePrint Archive 2006, p. 73, January 2006

    Google Scholar 

  19. Lyle, J.R., Miller, P.E., Pundlik, S.J., Woodard, D.L.: Soft biometric classification using periocular region features. In: 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–7, September 2010. https://doi.org/10.1109/BTAS.2010.5634537

  20. Mehta, G., Dutta, M.K., Kim, P.S.: A secure encryption method for biometric templates based on chaotic theory. In: Gavrilova, M.L., Tan, C.J.K. (eds.) Transactions on Computational Science XXVII. LNCS, vol. 9570, pp. 120–140. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-50412-3_8

    Chapter  Google Scholar 

  21. Niinuma, K., Park, U., Jain, A.K.: Soft biometric traits for continuous user authentication. IEEE Trans. Inf. Forensics Secur. 5(4), 771–780 (2010)

    Article  Google Scholar 

  22. Nixon, M.S.: A step beyond: advances in gait and ‘soft’ biometrics. Biom. Technol. Today 2016(10), 9–11 (2016). https://doi.org/10.1016/S0969-4765(16)30158-8, http://www.sciencedirect.com/science/article/pii/S0969476516301588

  23. Nixon, M.S., Correia, P.L., Nasrollahi, K., Moeslund, T.B., Hadid, A., Tistarelli, M.: On soft biometrics. Pattern Recognit. Lett. 68, 218–230 (2015). https://doi.org/10.1016/j.patrec.2015.08.006, http://www.sciencedirect.com/science/article/pii/S0167865515002615, special Issue on Soft Biometrics

  24. Ogbanufe, O., Kim, D.J.: Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decis. Support Syst. 106, 1–14 (2018). https://doi.org/10.1016/j.dss.2017.11.003, http://www.sciencedirect.com/science/article/pii/S0167923617302154

  25. Padma, P., Srinivasan, S.: A survey on biometric based authentication in cloud computing. In: 2016 International Conference on Inventive Computation Technologies (ICICT), vol. 1, pp. 1–5 (2016). https://doi.org/10.1109/INVENTIVE.2016.7823273

  26. Sabhanayagam, T., Venkatesan, V.P., Senthamaraikannan, K.: A comprehensive survey on various biometric systems. Int. J. Appl. Eng. Res. 13(5), 2276–2297 (2018)

    Google Scholar 

  27. Schmidt, E.: Conversation with eric schmidt hosted by danny sullivan. In: Search Engine Strategies Conference (2006)

    Google Scholar 

  28. Shahzadi, R., et al.: Three tier fog networks: enabling IoT/5G for latency sensitive applications. China Commun. 16(3), 1–11 (2019)

    Google Scholar 

  29. Sharma, V., Bansal, P.: A review on speaker recognition approaches and challenges. Int. J. Eng. Res. Technol. (IJERT) 2(5), 1581–1588 (2013)

    Google Scholar 

  30. Singh, M., Singh, R., Ross, A.: A comprehensive overview of biometric fusion. Inf. Fusion 52, 187–205 (2019). https://doi.org/10.1016/j.inffus.2018.12.003, http://www.sciencedirect.com/science/article/pii/S156625351830839X

  31. Tome, P., Fierrez, J., Vera-Rodriguez, R., Nixon, M.S.: Soft biometrics and their application in person recognition at a distance. IEEE Trans. Inf. Forensics Secur. 9(3), 464–475 (2014). https://doi.org/10.1109/TIFS.2014.2299975

    Article  Google Scholar 

  32. Wayman, J.: Large-scale civilian biometric systems-issues and feasibility. In: Proceedings of Card Tech/Secur Tech ID, vol. 732 (1997)

    Google Scholar 

  33. Yang, L., Yang, G., Yin, Y., Xi, X.: Exploring soft biometric trait with finger vein recognition. Neurocomputing 135, 218–228 (2014). https://doi.org/10.1016/j.neucom.2013.12.029, http://www.sciencedirect.com/science/article/pii/S0925231214000460

  34. Yang, P., Zhang, N., Bi, Y., Yu, L., Shen, X.S.: Catalyzing cloud-fog interoperation in 5G wireless networks: an SDN approach. IEEE Network 31(5), 14–20 (2017). https://doi.org/10.1109/MNET.2017.1600078

    Article  Google Scholar 

  35. Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37–42 (2015)

    Google Scholar 

  36. Zhang, C., Zhu, L., Xu, C.: PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf. Sci. 409–410, 56–67 (2017). https://doi.org/10.1016/j.ins.2017.05.006, http://www.sciencedirect.com/science/article/pii/S0020025516313639

  37. Zhu, H., Wei, Q., Yang, X., Lu, R., Li, H.: Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data. IEEE Trans. Cloud Comput. 1 (2018). https://doi.org/10.1109/TCC.2018.2866405

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yulong Fu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, J., Fu, Y., Liu, M., Cao, J., Li, H., Yan, Z. (2023). Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. In: Meng, W., Yan, Z., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2023. Lecture Notes in Computer Science, vol 14341. Springer, Singapore. https://doi.org/10.1007/978-981-99-7032-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7032-2_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7031-5

  • Online ISBN: 978-981-99-7032-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics